Examples and Risks: 3 HIPAA Covered Entities Handling Health Care Benefits

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Examples and Risks: 3 HIPAA Covered Entities Handling Health Care Benefits

Kevin Henry

HIPAA

January 10, 2025

7 minutes read
Share this article
Examples and Risks: 3 HIPAA Covered Entities Handling Health Care Benefits

HIPAA defines three covered entities that handle health care benefits and must safeguard Protected Health Information: health plans, healthcare providers, and healthcare clearinghouses. This article clarifies each entity’s role, illustrates practical examples, and highlights risks and controls so you can manage PHI confidently and compliantly.

Overview of HIPAA Covered Entities

Covered entities are subject to the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. These standards protect PHI in any form and require reasonable and appropriate Administrative Safeguards, technical controls, and organizational practices tailored to your risk profile.

The three covered entities

  • Health plans: organizations that pay for or provide health care benefits (for example, employer-sponsored group health plans and insurers).
  • Healthcare providers: individuals or organizations that furnish medical services and transmit standard electronic transactions (such as eligibility checks or claims).
  • Healthcare clearinghouses: intermediaries that translate, reformat, or standardize health data between plans and providers.

Each entity must apply minimum necessary standards, secure electronic PHI (ePHI), and maintain documentation to demonstrate compliance and readiness for potential Enforcement Actions.

Types of Health Plans

Health plans are central to administering health care benefits. They create, receive, maintain, and transmit PHI to enroll members, verify eligibility, pay claims, coordinate benefits, and manage appeals.

Primary plan types

  • Employer-sponsored group health plans, including self-insured plans that use a third-party administrator (TPA).
  • Health insurance issuers and HMOs that underwrite and pay medical claims.
  • Government programs that pay for health care, such as Medicare, Medicaid, and similar programs.
  • Specialty and supplemental benefits, including dental and vision plans that meet the HIPAA definition of a health plan.
  • Certain Employee Assistance Programs (EAPs) or wellness programs when they provide medical care and handle PHI.
  • Health FSAs offered by employers; HSAs themselves are typically not covered entities, though service providers may be business associates.

Examples in practice

  • An employer’s self-funded plan works with a TPA to adjudicate claims and provide Explanation of Benefits (EOBs).
  • An HMO enrolls members, manages provider networks, and conducts utilization review using PHI.
  • A dental plan processes pre-treatment estimates and claim payments for covered procedures.

Edge cases and clarifications

  • Disability, life, or workers’ compensation insurers are not health plans under HIPAA, though they may receive limited PHI for coordination permitted by law.
  • Brokerages, TPAs, and benefits platforms generally act as business associates and require a Business Associate Agreement when accessing PHI on a plan’s behalf.

Roles of Healthcare Providers

Providers become covered entities when they transmit health information electronically in standard transactions. Typical activities include verifying eligibility, submitting claims, receiving remittance advice, and managing prior authorizations.

Provider responsibilities and examples

  • Clinicians (physicians, nurse practitioners, therapists) document encounters, submit claims, and coordinate care using PHI.
  • Hospitals and clinics manage registration, billing, and care management data flows with health plans and clearinghouses.
  • Pharmacies and labs process prescriptions and test orders, exchange results, and reconcile payments.

Providers must implement role-based access, authenticate users, encrypt devices, and train staff so PHI used for benefits processing remains protected.

Functions of Healthcare Clearinghouses

Clearinghouses serve as data translators between providers and health plans, ensuring transactions meet data security standards and formatting requirements.

Core clearinghouse functions

  • Convert nonstandard claims into standard formats (for example, X12 837) and route them to the correct health plan.
  • Validate and “scrub” data, flagging missing codes or eligibility mismatches to reduce denials.
  • Return standardized remittance advice (835), eligibility responses (271), and claim status (277) to providers.
  • Apply transmission safeguards, such as encryption in transit and integrity checks, to protect PHI.

Because clearinghouses aggregate PHI at scale, they must maintain rigorous Administrative Safeguards, vendor oversight, and audit trails to prevent unauthorized access and disclosures.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Common Risks of Non-Compliance

Failures often stem from gaps in governance, technology controls, or workforce practices. A focused Compliance Risk Assessment helps surface these exposures before they trigger reportable events.

  • Misdirected EOBs or statements, wrong-address mailings, or unsecured email disclosures of PHI.
  • Unencrypted laptops, lost mobile devices, or misconfigured cloud storage leaking ePHI.
  • Insufficient access controls, shared credentials, or lack of multi-factor authentication for benefits systems.
  • Absence of required Business Associate Agreements with TPAs, brokers, wellness vendors, or cloud service providers.
  • Incomplete workforce training, phishing susceptibility, or improper disposal of paper records and media.
  • Inadequate monitoring and logging, delaying detection and investigation under the Breach Notification Rule.
  • Weak data retention and minimum necessary policies leading to over-collection and unnecessary exposure.

Consequences can include corrective action plans, monetary penalties, reputational damage, and operational disruption stemming from Enforcement Actions or investigations.

Importance of Business Associate Agreements

A Business Associate Agreement is required when a vendor creates, receives, maintains, or transmits PHI for a covered entity. The BAA defines permitted uses and disclosures, mandates safeguards, and sets breach reporting duties.

When a BAA is needed

  • Third-party administrators handling claims or COBRA administration for a group health plan.
  • Benefits enrollment platforms, data warehouses, or analytics vendors processing eligibility and claims PHI.
  • Cloud service providers, email gateways, and secure messaging tools storing or transmitting ePHI.
  • Wellness, telehealth, disease management, or EAP vendors delivering care services on a plan’s behalf.

Essential BAA provisions

  • Permitted uses/disclosures and minimum necessary standards.
  • Administrative, physical, and technical safeguards aligned to data security standards.
  • Breach, incident, and security event reporting timelines and cooperation duties.
  • Subcontractor flow-down requirements and right-to-audit or assurance mechanisms.
  • Return or destruction of PHI at termination and sanctions for non-compliance.

Strategies for Employee Training and Risk Analysis

Strong programs combine role-based training, practical exercises, and a living risk analysis that informs day-to-day operations. Your goal is to prevent incidents, detect them quickly, and respond in a way that protects individuals and the organization.

Effective training approaches

  • Role-specific modules for benefits staff, providers, and IT on handling PHI and minimum necessary practices.
  • Security awareness touchpoints (orientation, quarterly refreshers) plus simulated phishing and spot checks.
  • Job aids and checklists for common workflows: eligibility verification, prior authorization, EOB mailing, and member inquiries.
  • Drills for suspected breaches and privacy complaints, including documentation steps under the Breach Notification Rule.

Practical risk analysis steps

  • Inventory systems, vendors, and data flows that store or transmit ePHI; map where PHI enters, moves, and exits.
  • Identify threats and vulnerabilities; rate likelihood and impact to prioritize remediation.
  • Implement risk treatments: encryption, MFA, data loss prevention, endpoint protection, and access recertifications.
  • Measure effectiveness with KPIs (training completion, phishing fail rate, time-to-detect, time-to-contain) and update controls accordingly.
  • Document decisions and evidence to demonstrate ongoing Compliance Risk Assessment and continuous improvement.

Conclusion

Health plans, providers, and clearinghouses each play distinct roles in delivering health care benefits, yet all share responsibility for safeguarding PHI. By executing solid Administrative Safeguards, enforcing robust BAAs, and maintaining vigilant training and risk analysis, you can reduce breach likelihood, meet data security standards, and be prepared to respond effectively if incidents occur.

FAQs

What are the main types of HIPAA covered entities?

The three covered entities are health plans (including employer-sponsored group health plans and insurers), healthcare providers that conduct standard electronic transactions, and healthcare clearinghouses that standardize and route health data between parties.

How do healthcare clearinghouses handle PHI?

Clearinghouses receive data from providers or plans, convert it to standard formats, validate and correct errors, route transactions to the right destination, and return responses like remittance advice and eligibility results—all while applying safeguards to protect PHI in transit and at rest.

What are the consequences of a HIPAA data breach?

Consequences may include required notifications under the Breach Notification Rule, corrective action plans, monetary penalties, contractual liabilities with business associates, operational disruptions, and reputational harm.

How can covered entities ensure compliance with HIPAA standards?

Establish governance, conduct regular Compliance Risk Assessments, implement Administrative Safeguards and technical controls (such as encryption and MFA), execute and manage Business Associate Agreements, train the workforce, monitor for incidents, and document policies, procedures, and evidence of ongoing compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles